14 Nov
2005
14 Nov
'05
5:49 p.m.
Randy Bush wrote:
for one host, 185,932 ssh dictionary password attacks in one gmt day (and, of course, password login is not enabled).
Partial "solution": rate limit ports to max X (5) new connects per X (60 secs) time. Et tada, almost not to be seen any more. Misc Linux-based example: http://unfix.org/~jeroen/archive/rc.ratelimit Also possible with your favorite BSD and other OS's... Limiting port 25 also helps with those annoying bots around the net. Other solution: disable IPv4 SSH and enable the IPv6 one, no scanning on that plane ;) Greets, Jeroen